• AI Search
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Security

WhatsApp GhostPairing Scam Lets Hackers Hijack Accounts

Akinola Ajibola by Akinola Ajibola
December 20, 2025
in Security
Share on FacebookShare on Twitter

A cybersecurity company has found a new method for taking over WhatsApp accounts that exploits the app’s legal device-linking feature. Without obtaining passwords, SIM cards, or authentication codes, the GhostPairing campaign enables hackers to fully access a victim’s WhatsApp account. The attack uses social engineering to persuade consumers into authorising a malicious device rather than taking use of software faults. According to reports, the technique is hard to spot, spreads swiftly through reliable contacts, and exposes significant flaws in the way device-pairing features are now created and comprehended by users.

The research from the cybersecurity company Gen Digital claims that the attack starts with a quick message from a reliable acquaintance, usually along the lines of “Hey, I just found your photo!” pickup line, which is sent. The message contains a link that shows up in WhatsApp as a preview similar to Facebook. When visitors click the link, they are taken to a phoney webpage that mimics a Facebook photo viewer and requests that they “verify” before they can access the material.

Facebook is not involved in the verification process at all. Rather, the page subtly initiates the official device-pairing procedure of WhatsApp. After victims provide their phone number, WhatsApp creates a numerical pairing code. The phoney page then gives users instructions to input this code into WhatsApp, giving the impression that it is a standard security check.

Users unintentionally accept the attacker’s browser as a linked device when they type the code, according to the research. This grants attackers complete access to WhatsApp Web, enabling them to read conversations, download media, send messages as the victim, and receive new messages instantly. It is challenging to detect the hack because the phone keeps operating normally.

Although the campaign was initially seen in Czechia, Gen Digital cautioned that it might quickly expand to other areas. Instead of using mass spam to spread the attack, compromised accounts are utilised to transmit the same enticement to contacts and group chats.

The technique does not take advantage of software vulnerabilities or get around encryption, according to the report’s researchers. Rather, it depends on legitimate features functioning as intended and social engineering. This makes the attack especially worrisome, according to the research, since linked devices stay active until users actively deactivate them.

Users are encouraged to often check WhatsApp’s Settings > Linked Devices section and delete any strange sessions in order to be safe. Additionally, the researchers suggested turning on two-step verification, treating any request to scan QR codes or input pairing numbers from websites as suspicious, and taking the time to confirm odd messages, even from contacts you know.

Also Whatsapp users should never share codes, never scan QR codes from outside websites or enter pairing codes. Whatsapp users should always be the only one to start the WhatsApp device connecting process.

Another advise to users, is to activate 2FA, (Two Factor Authentication or Multi-Factor Authentication), in which the setting is in your WhatsApp settings, by enabling the Two-Step Verification. This offers a crucial layer of overall protection, even though it doesn’t prevent this particular vulnerability once a device is connected.

Also users should check unexpected links, before clicking on a strange link sent by a friend, give them a call to make sure.

According to reports, GhostPairing is drawing attention to more general dangers in device-pairing technologies that are utilised by numerous apps. Convenience is an important benefit, but the report suggested that greater controls, more context for pairing requests, and more explicit cautions might help lessen abuse.

Why it is dangerous, with the authentication bypass, the link seems authentic to WhatsApp’s systems because the user directly authorises it, and this circumvents the conventional security. Also stealthy persistence by the “ghost device” which might stay linked in the background for months while the victim’s phone keeps operating normally. The quick spread is a cycle that is continued by the attackers using the compromised account to message the victim’s friends, family, and co-workers.

Related Posts:

  • skynews-instagram-meta-facebook_6688367
    WhatsApp iOS Users May Soon Link Instagram Profiles
  • Picture2
    Soon, WhatsApp Will Simplify the Process of Adding…
  • WA_NEW_MULTIPLE_ACCOUNTS_FEATURE_SETTINGS_IOS
    WhatsApp Plans to Introduce Multiple Accounts Feature on iOS
  • English_WhatsApp_passkey-encrypted-backups-1
    WhatsApp Adds Passkey Protection for Encrypted Backups
  • WA_ADD_FACEBOOK_PROFILE_LINKS_FEATURE_ANDROID
    WhatsApp Beta Adds Option to Link Facebook Profile
  • WA_STRICT_SECURITY_ACCOUNT_SETTINGS_FEATURE_ANDROID
    WhatsApp Tests ‘Strict Account Settings’ for Better Security
  • skynews-russia-hacker_5812455
    Russian Hackers Target WhatsApp for Data on Ukraine
  • blog-a-lurking-npm-package
    Malicious npm Package Compromises WhatsApp Accounts

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: securitywhatsappwhatsapp ghostpairing
Akinola Ajibola

Akinola Ajibola

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • What’s Really Going On With Nvidia and OpenAI’s Mega Deal ? February 4, 2026
  • What “Continuous” Actually Means in Modern AppSec February 4, 2026
  • Apple Adds Claude and OpenAI Codex to Xcode for Agentic Coding February 4, 2026
  • Vercel Rebuilds v0 to Take AI Apps From Prototype to Production February 4, 2026
  • Microsoft Reveals First Xbox Game Pass Additions for Feb 2026 February 3, 2026
  • GoCab Raises $45m Seed Round After Hitting $17m ARR February 3, 2026
  • SpaceX Acquires xAI in $1.25T AI and Space Consolidation February 3, 2026
  • OpenAI Moves Beyond Nvidia Chips in AI Arms Race February 3, 2026
  • SpaceX Acquires xAI in Major Strategic Move February 2, 2026
  • UK Launches Fuel Finder API for Petrol Station Prices February 2, 2026
  • France Signals Possible VPN Restrictions Amid Under-15 Social Media Ban February 2, 2026
  • Samsung Galaxy Unpacked 2026: What to Expect From the Galaxy S26 February 2, 2026

Browse Archives

February 2026
MTWTFSS
 1
2345678
9101112131415
16171819202122
232425262728 
« Jan    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • AI Search
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.